Abstract
The Attribute Based Encryption (ABE) algorithm can be used to realize fine grained access control for the mobile cloud storage. In ABE, the decryption algorithm has high complexity and the rank revocation is difficult to be implemented. An ABE middleware with rank revocation is given in this paper. The ABE middleware delegate the ABE decryption operation for the resource constrained mobile device. The attribute authority can revoke the user’s rank through this middleware instantly with fine-grained control and the revocation process may not affect any other users. The ABE middleware is implemented and experiment results show that the ABE middleware improves ABE decryption performance about 30 times.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
The 34th accounting reports of the development situation of China Internet. China Internet, vol. 7 (2014)
Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)
Horváth, M.: Attribute-based encryption optimized for cloud computing. In: Italiano, G.F., Margaria-Steffen, T., Pokorný, J., Quisquater, J.-J., Wattenhofer, R. (eds.) SOFSEM 2015. LNCS, vol. 8939, pp. 566–577. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46078-8_47
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption, pp. 321–334 (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Wang, Y.D., Yang, J.H., Xu, C., Ling, X., Yang, Y.: Survey on access control technologies for cloud computing. Ruan Jian Xue Bao/J. Softw. 26(5), 1129–1150 (2015)
Su, J.S., Cao, D., Wang, X.F., Sun, Y.P., Hu, Q.L.: Attribute-based encryption schemes. J. Softw. 22(6), 1299–1315 (2011)
Pirretti, M., Traynor, P., Mcdaniel, P., et al.: Secure attribute-based systems, pp. 99–112 (2006)
Asim, M., Ibraimi, L., Petković, M.: Ciphertext-policy attribute-based broadcast encryption scheme. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 244–246. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24712-5_25
Wang, P.P., Feng, D.G., Zhang, L.W.: CP-ABE scheme supporting fully fine-grained attribute revocation. J. Softw. 23(10), 2805–2816 (2012)
Belqasmi, F., Glitho, R., Fu, C.: RESTful web services for service provisioning in next-generation networks: a survey. IEEE Commun. Mag. 49(12), 66–73 (2011)
Belqasmi, F., Singh, J., Bani Melhem, S.Y., et al.: SOAP-based vs. RESTful web services: a case study for multimedia conferencing. IEEE Int. Comput. 16(4), 54–63 (2012)
Li, Y., Zeng, Z.Y., Zhang, X.F.: Outsourced decryption scheme supporting attribute revocation. J. Tsinghua Univ. (Sci. Technol.) 12, 1664–1669 (2013)
Acknowledgment
This work was partly supported by the National Natural Science Foundation of China (61661015), Ministry of Education Key Lab of Cognitive Radio and Information Processing Found (CRKL160101), Guangxi Collaborative Innovation Center of Cloud Computing and Big Data Found (YD16801), Guangxi Scientific and technological plan (1598008-28), High Level of Innovation Team of Colleges and Universities in Guangxi Outstanding Scholars Program Funding, and GUET Cloud Security and Cloud Service Innovation Group Project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dong, Q., He, Q., Cai, M., Liu, P. (2018). An Attribute Based Encryption Middleware with Rank Revocation for Mobile Cloud Storage. In: Huang, M., Zhang, Y., Jing, W., Mehmood, A. (eds) Wireless Internet. WICON 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 214. Springer, Cham. https://doi.org/10.1007/978-3-319-72998-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-72998-5_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72997-8
Online ISBN: 978-3-319-72998-5
eBook Packages: Computer ScienceComputer Science (R0)